CVE-2026-2836: Vulnerability in Cloudflare https://github.com/cloudflare/pingora
A cache poisoning vulnerability has been found in the Pingora HTTP proxy framework’s default cache key construction. The issue occurs because the default HTTP cache key implementation generates cache keys using only the URI path, excluding critical factors such as the host header (authority). Operators relying on the default are vulnerable to cache poisoning, and cross-origin responses may be improperly served to users. Impact This vulnerability affects users of Pingora's alpha proxy caching feature who relied on the default CacheKey implementation. An attacker could exploit this for: * Cross-tenant data leakage: In multi-tenant deployments, poison the cache so that users from one tenant receive cached responses from another tenant * Cache poisoning attacks: Serve malicious content to legitimate users by poisoning shared cache entries Cloudflare's CDN infrastructure was not affected by this vulnerability, as Cloudflare's default cache key implementation uses multiple factors to prevent cache key poisoning and never made use of the previously provided default. Mitigation: We strongly recommend Pingora users to upgrade to Pingora v0.8.0 or higher, which removes the insecure default cache key implementation. Users must now explicitly implement their own callback that includes appropriate factors such as Host header, origin server HTTP scheme, and other attributes their cache should vary on. Pingora users on previous versions may also remove any of their default CacheKey usage and implement their own that should at minimum include the host header / authority and upstream peer’s HTTP scheme.
AI Analysis
Technical Summary
CVE-2026-2836 identifies a cache poisoning vulnerability in the Pingora HTTP proxy framework, specifically in its alpha proxy caching feature's default cache key construction. The vulnerability arises because the default cache key implementation generates keys solely based on the URI path, neglecting the Host header (authority) and other critical request attributes. This flawed design allows attackers to craft requests that cause the proxy to serve cached responses intended for one tenant or origin to another, leading to cross-tenant data leakage and cache poisoning. Such attacks can result in users receiving malicious or unauthorized content, undermining data integrity and confidentiality. The vulnerability affects users of Pingora versions prior to 0.8.0 who have not customized their cache key logic. Cloudflare's CDN infrastructure is unaffected as it employs a more comprehensive cache key strategy that includes multiple request factors, preventing this form of cache poisoning. The vulnerability has a CVSS 4.0 score of 8.4, indicating high severity due to network attack vector, low attack complexity, no privileges required, and no user interaction needed. Mitigation involves upgrading to Pingora v0.8.0 or later, which removes the insecure default cache key implementation, and requires users to explicitly implement cache key callbacks that incorporate the Host header, upstream HTTP scheme, and other relevant attributes to ensure cache keys uniquely identify content per tenant or origin. Users on older versions should remove default cache key usage and implement their own secure cache key logic. No known exploits have been reported in the wild as of the publication date.
Potential Impact
The vulnerability poses significant risks to organizations deploying Pingora's proxy caching in multi-tenant or shared environments. Exploitation can lead to cross-tenant data leakage, where sensitive information intended for one tenant is exposed to others, violating confidentiality and potentially regulatory compliance. Cache poisoning can also enable attackers to serve malicious content to legitimate users, compromising data integrity and potentially leading to further exploitation such as malware delivery or phishing. Since the vulnerability requires no authentication and has low attack complexity, it can be exploited remotely by unauthenticated attackers, increasing the threat surface. Organizations relying on default cache key implementations without customization are particularly vulnerable. Although Cloudflare's CDN is not affected, third-party users of Pingora may face service disruption, reputational damage, and legal consequences if sensitive data is leaked or malicious content is served. The scope is limited to Pingora users who have not upgraded or customized their cache key logic, but given the growing adoption of proxy caching frameworks, the impact could be widespread among affected deployments.
Mitigation Recommendations
1. Upgrade immediately to Pingora version 0.8.0 or later, which removes the insecure default cache key implementation. 2. Implement explicit cache key callbacks that incorporate the Host header (authority), upstream HTTP scheme, and any other relevant request attributes to ensure cache keys uniquely identify cached content per tenant or origin. 3. For users on older versions unable to upgrade immediately, remove any usage of the default CacheKey implementation and replace it with a custom cache key function that includes at minimum the Host header and upstream peer’s HTTP scheme. 4. Conduct thorough testing of cache behavior post-implementation to verify that cross-tenant cache poisoning is mitigated and that cache keys correctly segregate tenant data. 5. Monitor proxy logs for unusual cache hit patterns or anomalies that could indicate attempted cache poisoning. 6. Educate development and operations teams about the risks of default cache key usage and the importance of customizing cache keys in multi-tenant environments. 7. Review and audit other proxy or caching components in the infrastructure for similar cache key construction issues to prevent analogous vulnerabilities.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Netherlands, France, Japan, South Korea, India
CVE-2026-2836: Vulnerability in Cloudflare https://github.com/cloudflare/pingora
Description
A cache poisoning vulnerability has been found in the Pingora HTTP proxy framework’s default cache key construction. The issue occurs because the default HTTP cache key implementation generates cache keys using only the URI path, excluding critical factors such as the host header (authority). Operators relying on the default are vulnerable to cache poisoning, and cross-origin responses may be improperly served to users. Impact This vulnerability affects users of Pingora's alpha proxy caching feature who relied on the default CacheKey implementation. An attacker could exploit this for: * Cross-tenant data leakage: In multi-tenant deployments, poison the cache so that users from one tenant receive cached responses from another tenant * Cache poisoning attacks: Serve malicious content to legitimate users by poisoning shared cache entries Cloudflare's CDN infrastructure was not affected by this vulnerability, as Cloudflare's default cache key implementation uses multiple factors to prevent cache key poisoning and never made use of the previously provided default. Mitigation: We strongly recommend Pingora users to upgrade to Pingora v0.8.0 or higher, which removes the insecure default cache key implementation. Users must now explicitly implement their own callback that includes appropriate factors such as Host header, origin server HTTP scheme, and other attributes their cache should vary on. Pingora users on previous versions may also remove any of their default CacheKey usage and implement their own that should at minimum include the host header / authority and upstream peer’s HTTP scheme.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-2836 identifies a cache poisoning vulnerability in the Pingora HTTP proxy framework, specifically in its alpha proxy caching feature's default cache key construction. The vulnerability arises because the default cache key implementation generates keys solely based on the URI path, neglecting the Host header (authority) and other critical request attributes. This flawed design allows attackers to craft requests that cause the proxy to serve cached responses intended for one tenant or origin to another, leading to cross-tenant data leakage and cache poisoning. Such attacks can result in users receiving malicious or unauthorized content, undermining data integrity and confidentiality. The vulnerability affects users of Pingora versions prior to 0.8.0 who have not customized their cache key logic. Cloudflare's CDN infrastructure is unaffected as it employs a more comprehensive cache key strategy that includes multiple request factors, preventing this form of cache poisoning. The vulnerability has a CVSS 4.0 score of 8.4, indicating high severity due to network attack vector, low attack complexity, no privileges required, and no user interaction needed. Mitigation involves upgrading to Pingora v0.8.0 or later, which removes the insecure default cache key implementation, and requires users to explicitly implement cache key callbacks that incorporate the Host header, upstream HTTP scheme, and other relevant attributes to ensure cache keys uniquely identify content per tenant or origin. Users on older versions should remove default cache key usage and implement their own secure cache key logic. No known exploits have been reported in the wild as of the publication date.
Potential Impact
The vulnerability poses significant risks to organizations deploying Pingora's proxy caching in multi-tenant or shared environments. Exploitation can lead to cross-tenant data leakage, where sensitive information intended for one tenant is exposed to others, violating confidentiality and potentially regulatory compliance. Cache poisoning can also enable attackers to serve malicious content to legitimate users, compromising data integrity and potentially leading to further exploitation such as malware delivery or phishing. Since the vulnerability requires no authentication and has low attack complexity, it can be exploited remotely by unauthenticated attackers, increasing the threat surface. Organizations relying on default cache key implementations without customization are particularly vulnerable. Although Cloudflare's CDN is not affected, third-party users of Pingora may face service disruption, reputational damage, and legal consequences if sensitive data is leaked or malicious content is served. The scope is limited to Pingora users who have not upgraded or customized their cache key logic, but given the growing adoption of proxy caching frameworks, the impact could be widespread among affected deployments.
Mitigation Recommendations
1. Upgrade immediately to Pingora version 0.8.0 or later, which removes the insecure default cache key implementation. 2. Implement explicit cache key callbacks that incorporate the Host header (authority), upstream HTTP scheme, and any other relevant request attributes to ensure cache keys uniquely identify cached content per tenant or origin. 3. For users on older versions unable to upgrade immediately, remove any usage of the default CacheKey implementation and replace it with a custom cache key function that includes at minimum the Host header and upstream peer’s HTTP scheme. 4. Conduct thorough testing of cache behavior post-implementation to verify that cross-tenant cache poisoning is mitigated and that cache keys correctly segregate tenant data. 5. Monitor proxy logs for unusual cache hit patterns or anomalies that could indicate attempted cache poisoning. 6. Educate development and operations teams about the risks of default cache key usage and the importance of customizing cache keys in multi-tenant environments. 7. Review and audit other proxy or caching components in the infrastructure for similar cache key construction issues to prevent analogous vulnerabilities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- cloudflare
- Date Reserved
- 2026-02-19T21:33:42.425Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a8c847d1a09e29cb860502
Added to database: 3/5/2026, 12:03:19 AM
Last enriched: 3/12/2026, 8:22:40 PM
Last updated: 4/19/2026, 7:34:53 AM
Views: 236
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.